Sandboxie program groups




















Right-click on the tray icon to show or hide the program, terminate all programs, or disable applications that were forced to run in the sandboxed mode. So, where did the shortcuts to open programs go? Let's go back to the UI, select a sandbox and right-click on it to access the context menu. The first option, Run, has the shortcuts that you're looking for. This is a little inconvenient if you're used to the old version, but it's not a dealbreaker.

Other options in the menu allow you to terminate any running programs, explore the contents of the box. You can save your sandbox by taking snapshots. Switch to the Simple View from the view menu to get rid of the toolbar, bottom pane. Drag and drop executable onto Sandboxie Plus' interface to run them in sandboxed mode.

The virtual environment tool adds the good-old "Run Sandboxed" option to the Explorer shell-menu, which you can use to run programs securely. The toolbar has six buttons: the first one opens the settings, the second one "Keep Terminated" saves closed programs in the sandbox's memory.

The Cleanup menu discards processes and the logs for the three panes at the bottom. The 4th option on the toolbar opens the Sandboxie. INI for editing. Changes that you make to it are saved automatically, and you don't need to restart the program.

The Sbie messages tab in the bottom pane stores a log of actions performed in the sandbox. The Api Call Log needs to be configured manually, and this isn't something the average user needs.

There are lots of other settings that you can tinker including Software Compatibility options. To modify a Sandbox however, you'll need to right-click on it on the main screen and select Sandbox Options. Change the color of the sandbox window border, and set whether the indicator symbol should be displayed in the title bar of programs. The Program Groups tab has a list of preset applications, well it has two groups of browsers, which Sandboxie Plus will isolate from the rest of your computer.

You may add new groups or new programs to an existing group using the buttons on the right edge of the tab. Want to run specific programs in the sandbox by default?

That's precisely what the Forced Programs tab is for. Just add the executable's name, e. This should be enough to get started with the program, but there are more settings that you may want to modify as the need arises.

A support community for the application can be found on Wilder's Security forums. If you ever wanted to use Sandboxie, but were scared by its interface, try Sandboxie Plus. Lots of old bugs from the old days have been fixed, but new ones pop up occasionally when a new version comes out.

I just reload the previous version and wait for the fix. Very reliable. New versions come out frequently. The developer is obviously talented and appears to be dedicated. Note that this has little effect if you are already running under a non-Administrator user account. This category manages restrictions for several types of global operations which are restricted in some way within the sandbox. Please see the associated Sandboxie Ini settings for more information.

This category manages restrictions for three types of global operations which are restricted in some way within the sandbox. However, when running games or other full screen applications in the sandbox, it may be useful to permit the simulation of keyboard and mouse input. You can place additional restrictions on programs, to tighten the security of the sandbox. This access mode hides all registry data which is located within the selected registry key outside the sandbox.

However, programs in the sandbox can create new registry data within the corresponding folder in the sandbox. Deny all access to a registry key resource, for example to a key containing Windows policy settings. For example, if an exclusion for a registry key appears in both Direct Access and Blocked Access , the latter will apply, denying all access to the registry key. These resources are created by programs running the system as a way to coordinate operations or otherwise communicate.

Allow direct access to an IPC object resource. Deny all access to an IPC object resource. For example, if an exclusion for an IPC object appears in both Direct Access and Blocked Access , the latter will apply, denying all access to the object. For example, by default Sandboxie allows sandboxed programs to access the audio device. This category manages exclusions for window classes. These resources are primarily related to windows displayed on the screen, but can also be used by programs as a way to coordinate operations or otherwise communicate.

You can specify which window classes, that were created outside the sandbox, will be available for use by sandboxed programs. This category manages exclusions for COM classes. These resources represent objects which are used as a way to coordinate operations or otherwise communicate. You can specify the COM class identifiers for those COM objects that exist outside the sandbox, and which should be accessible to sandboxed programs.

Under the supervision of Sandboxie, an application operates normally and at full speed, but can't effect permanent changes to your computer. Instead, the changes are effected only in the sandbox. Or skip ahead to Getting Started Part Six which discusses a few final points. Sandboxie is operated primarily through the Sandboxie Control program.



0コメント

  • 1000 / 1000